Authentication method, re-authentication method and communication device

A technology of authentication and authentication keys, applied in the field of communication, can solve problems such as increasing the complexity of RS, and achieve the effect of ensuring validity

Inactive Publication Date: 2010-02-03
SHANGHAI HUAWEI TECH CO LTD
View PDF0 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] In the LTE system after the introduction of RS, the RS authentication process must be equipped with a USIM card on the RS to store the pre-shared permanent key between the RS and the HSS, which will increase the complexity of the RS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, re-authentication method and communication device
  • Authentication method, re-authentication method and communication device
  • Authentication method, re-authentication method and communication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] In the embodiment of the present invention, the following methods can be used to implement secure network access of the RS, and the RS does not need to be equipped with a USIM card, which will be described in detail below with reference to the accompanying drawings.

[0061] see figure 2 , an authentication method, comprising:

[0062] Step 201: Send an authentication request to the base station, where the authentication request includes the digital certificate of the RS;

[0063] An authentication request can also be sent to the eNB. After the RS is introduced, various systems that support the digital certificate authentication method can authenticate the RS. Therefore, the eNB in ​​the subsequent embodiments refers to a base station that can support the digital certificate authentication method.

[0064] The authentication request includes the digital certificate of the RS, such as the X.509 digital certificate, the capability of the RS, the signature of the RS on t...

Embodiment 2

[0074] In this embodiment, after the two-way authentication is completed between the RS and the eNB, the eNB derives an authentication key and sends it to the RS. After the RS is introduced, various systems that support digital certificate authentication can authenticate the RS, so the eNB in ​​this embodiment can be a base station. A detailed description will be given below in conjunction with the accompanying drawings. see image 3 , the specific steps for implementing the method of Embodiment 2 are described in detail below:

[0075] Step 301: RS sends an authentication request to eNB;

[0076] The authentication request can be included in the authentication request message. The authentication request includes the digital certificate of the RS, such as the X.509 digital certificate, the capability of the RS, the signature of the digital certificate by the RS, and the first random number RAND1 randomly generated by the RS. Capabilities are encryption / integrity protection ...

Embodiment 3

[0095] In this embodiment, after the eNB completes the one-way authentication of the RS, the eNB derives the authentication key and issues it to the RS. After the RS is introduced, various systems that support digital certificate authentication can authenticate the RS, so the eNB in ​​this embodiment can be a base station. A detailed description will be given below in conjunction with the accompanying drawings.

[0096] see Figure 4 , the specific steps of the method for implementing the third embodiment are described in detail below:

[0097] Step 401 is the same as step 301 and will not be repeated here.

[0098] Step 402: eNB authenticates RS, generates RAND2, and eNB generates authentication key AK;

[0099] The eNB authenticates the RS digital certificate through the received signature and RAND1. After the authentication is passed, the authentication of the RS on the network side is completed. The eNB generates the authentication key AK, and uses the eNB private key to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication method, a re-authentication method and a communication device. The authentication method comprises the following steps that: a relay stationsends an authentication request to a base station, wherein the authentication request contains a digital certificate of the relay station; a receiving base station sends an authentication response, wherein the authentication response contains the digital certificate of the base station and is sent after the digital certificate of the relay station passes through the authentication of the base station; and the digital certificate of the base station is authenticated and an authentication key is obtained. The authentication method sends the authentication request containing the digital certificate of the relay station through the relay station, receives the authentication response containing the digital certificate of the base station and authenticates by means of bidirectional authentication, thereby allowing the base station to complete a network complete access of the relay station without allocating a subscriber identity module card for the relay station. The re-authentication method provided by the embodiment of the invention can guarantee the effectiveness of the authentication key.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an authentication method, a re-authentication method and a communication device. Background technique [0002] With the increasing coverage of mobile systems, the number of users accessing the system is gradually increasing, and the services provided by service providers are diversified, making the complexity of the network constantly increasing. How to ensure the security of network and business information is a current issue. problems that urgently need to be resolved. [0003] In a mobile communication system, in order to ensure the security of operational services, the network side needs to perform authentication processing on the accessing user equipment (User Equipment, UE), so that illegal UEs cannot obtain services provided by the network side and protect the interests of operators. ; At the same time, the UE also needs to verify whether the authentication informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/069
CPCH04L63/0823H04W88/04H04W12/06H04L63/0869H04W84/047H04W12/065H04W12/069
Inventor 刘菁陈璟彭炎张爱琴
Owner SHANGHAI HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products